Application of Geo-Location-Based Access Control in an Enterprise Environment

Unauthorized Access has been difficult to stop or prevent in the last few decades using username and password authentication only. For an individual, data breach might just be a simple case of espionage or the loss of private credentials, for an enterprise, this could mean the loss of billions of do...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of computer network and information security 2018-01, Vol.10 (1), p.36-43
Hauptverfasser: L. Yisa, Victor, Meshach, Baba, Osho, Oluwafemi, Sule, Anthony
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!